# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
7a68d6c17da805e9ce729c457b5bf3ecb5ccc20321f73aab259173af216af65f
Pseudo Output
4a95f82dc6ec4816f56703b56d7810b0203487847592372c8c7c4defcdbf2743
Key Image
329529ae9b95855c745fee3dc0caa5633e41216a4f7d4fa6329a43a23d06ef46
Pseudo Output
d85ee1188748fa11a1117896dc64e67d3d964f76ff89fb94e89fe173a7057b4a
Key Image
f0b2d2084d6e2954ab00d5aed7f2c6b41360e5048b0aaee3aee3fab65a0c2272
Pseudo Output
02e883dd3acd80eb0b59a195aacfe5abf398f7e1a2bd0d41fa1c45204017c625
Key Image
00f3cd76298ee0a5a2488d82dccced67b3e5e1b05f25b4c7ef790f8a342c5140
Pseudo Output
825bc8dc068dbc0bbfa4d9694f0614b742aecc26b92d40dcf3d90d1892b3853d
Key Image
aa148be25ca0ce4e7bed2b180628e92de458488da8eae75a7c7dc1c0c88ef42b
Pseudo Output
ccba64d06d148bd737c8b2dc2a862829310e2839e969442ade3236ad53dbd360
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
fa670b638422e0aa540edd300f7e3b646ab03d41871dfc87816c1527f0d25b1f
Commitment
0cc7cf46e1a61dfe4720c50f2cb53e0aa5cee9c4ad3bdb8dd7ee4ef21bcc3123
Range Proof
672 bytes (Bulletproof)
Memo
fa7b3a26aa5d4cc07401da09009f23ef5ad1f40eead7c23fe46e06451ffb941f5fc63469be5693ce578f0785ccac680f610dc34edce906a998244b0c9f8ddcd44c5d42181e9e755cfacb96f0ee95960118d780c5067fce5c549815482dc9457f77ccdc1c14883cdf14043d119c26915ab179ab470ea13225950c885606a21116 (encrypted)
Stealth Address
ee940c42fddbc81e9bcd8ab22563fd1396b9d679172e79ec1ff61f62044cad30
Commitment
b8168928366308d08973120b64b14f4d2efd3d5e18ca2deda0b3d7a51082d613
Range Proof
672 bytes (Bulletproof)
Memo
208d86be93a6d445ab7c367a1c73a68e290038538c364711683d8558c8cdcae3b7fa98cd69f405f04c33c076744def1f94c1caf1334b396c9f5d11f0e0dfffda1734c0e9a8551437ded092649c6f24efb6582cd22e979cdc531dd1335ac11de62c4ba305c7fcf1f1d93dc5615037bb48978d2325e82f88ac642987ce54b744c8 (encrypted)